Hacker Newsnew | past | comments | ask | show | jobs | submit | j245's commentslogin

Applies to eBay and Amazon too ..



The trends for HS and Dropout are also negative. To me it implies education across the board is getting worse (assuming IQ is a good measure of “good” education).


> (assuming IQ is a good measure of “good” education)

It’s not at all.


> But most people aren't YouTubers. In my experience, people who aren't into tech usually have no idea their upload speeds are any slower than their download speeds, much less 25 times slower.

People who aren’t into tech aren’t trying to fine tune Llama2 and then upload it to a cloud machine


Be a lot cooler if they did.


From my understanding as a non security expert:

Pentest comes across more as checking all the common attack vectors don’t exist.

Getting out of bed to do the so-called “real stuff” is typically called a bug bounty program or security researching.

Both exist and I don’t see why most companies couldn’t start a bug bounty program if they really cared a lot about the “real stuff”


I work as pentester (as a freelance nowdays).

Getting out of bed and "real stuff" is supposed to be part of a pentest.

The problem is more the sheer amout of stuff your are supposed to know to be a pentester. Most pentesters come into the field by knowing a bit of XSS, a few thing about PHP, and SQL injections.

Then you start to work, and the clients need you to tests things like:

- compromise a full Windows Network, and take control of the Active Directory Server. Because of a misconfiguration of Active Directory Certificate Services. While dealing with Windows Defender

- test a web application that use websockets, React, nodejs, and GraphQL

- test a WindDev application, with a Java Backend on a AIX server

- check the security of an architecture with multiple services that use a Single Sign on, and Kubernetes

- exploit multiple memory corruption issues ranging form buffer overflow to heap and kernel exploitation

- evaluate the security of an IoT device, with a firmware OTA update and secure boot.

- be familiar with cloud tokens, and compliance with European data protection law.

- Mobile Security, with iOS and Android

- Network : radius, ARP cache poisoning, write a Scapy Layer for a custom protocol, etc

- Cryptography, you might need it

Most of this is actual stuff I had to work on at some point.

Even if you just do web, you should be able to detect and exploit all those vulnerabilities: https://portswigger.net/web-security/all-labs

Nobody knows everything. Being a pentester is a journey.

So in the end, most pentesters fall short on a lot this. Even with an OSCP certification, you don't know most of what you should know. I heard that in some company, people don't even try and just give you the results of a Nessus scan. But even if you are competent, sooner or later, you will run into something that you don't understand. And you have max 2 week to get familiar with it and test it. You can't test something that you don't understand.

The scanner always gives you a few things that are wrong (looking at you TLS ciphers). Even if you suck, or if the system is really secure. You can put a few things into your report. As a junior pentester, my biggest fear was always to hand an empty report. What were people going to think of you, if you work 1 week and don't find anything?


>As a junior pentester, my biggest fear was always to hand an empty report.

I'm trying to remember the rule where you leave something intentionally misconfigured/wrong for the compliance people to find and that you can fix so they don't look deeper into the system. A fun one with web servers is to get them to report they are some ancient version that runs on a different operating system. Like your IIS server showing it's Apache 2.2 or vice versa.

But at least from your description it sounds like you're attempting to pentest. So many of these pentesting firms are click a button, run a script, send a report and go on to the 5 other tickets you have that day type of firms.


Thanks for your honest reply. This part was my favourite:

    Nobody knows everything. Being a pentester is a journey.
I recommend that you add some contact details in your HN bio page. You might get some good ledes after those post.


I think the concern is more about the theatre of most modern pen-testing rather than expecting deep bug-bounty work. I'm not a security expert either, but I've had to refute "security expert" consultations from pen-test companies, and the reports are absolutely asinine half the time and filled with so many false positives due to very weak signature matching that they're more or less useless and give a false sense of security.

For example, dealing with a "legal threat" situation with the product I work on because a client got hit by ransomware and they blame our product because "we just got a security assessment saying everything was fine, and your product is the only other thing on the servers" -- checked the report, basically it just runs some extremely basic port checks/windows config checks that haven't been relevant for years and didn't even apply to the Windows versions they had, and in the end the actual attack came from someone in their company opening a malicious email and having a .txt file with passwords.

I don't doubt there are proper security firms out there, but I rarely encounter them.


That’s interesting. I thought maybe it’s a resource constraint issue, where companies prioritise investment in other areas and do the minimum to “get certified” but it sounds like finding a good provider can be extremely difficult.


Not really.

Real stuff should always be a pentest - penetration test where one is actively trying to exploit vulnerabilities. So person who orders that gets report with !!exploitable vulnerabilities!!.

Checking all common attack vectors is vulnerability scanning and is mostly running scanner and weeding out false positives but not trying to exploit any. Unfortunately most of companies/people call that a penetration test, while it cannot be, because there is no attempt at penetration. While automated scanning tools might do some magic to confirm vulnerability it still is not a penetration test.

In the end, bug bounty program is different in a way - you never know if any security researcher will even be interested in testing your system. So in reality you want to order penetration test. There is usually also a difference where scope of bug bounty program is limited to what is available publicly. Where company systems might not allow to create an account for non-business users, then security researcher will never have access to authenticated account to do the stuff. Bounty program has also other limitations because pentesting company gets a contract and can get much more access like do a white box test where they know the code and can work through it to prove there is exploitable issue.


As in every industry there are cheapskates, and especially in pentesting it is often hard for the customer to tell the good ones from the bad ones. Nevertheless, I think that you have never worked with a credible pentesting vendor. I am doing these tests for a living and would be ashamed to deliver anything coming near your description :-)


Bug bounty programs are a nightmare to run. For every real bug reported you’ll get thousands of nikto pdfs with CRITICAL in big red scare letters all over them. Then you’ll get dragged on twitter constantly for not being serious about security. Narrowing the field to vetted experts will similarly get you roasted for either having something to hide or not caring about inclusion. And god help you if you have to explain that you already knew about a bug reported by anyone with more than 30 followers…

There are as many taxonomies of security services as there are companies selling them. You have to be very specific about what you want and then read the contract carefully.


The checkbox form exists because crooked vendors are catering to organizations who are intentionally lazy about their cybersecurity.

Real penetration tests provide valuable insight that a bug bounty program won't.


pentest means penetration testing which mean one need to take the attacker hat and try to enter your network or the app infrastructure and get as much data as he can, be it institutionnal or customer data. It can be through technical means as well as social engineering practices. And then report back.

This is in no way related to a bug bounty program.


Counter point: Most of the top rated Bug Bounty hunters have a background in penetration testing.

I think it's more accurate to say Bug Bounty only covers a small subset of penetration testing (mainly in that escalation and internal pivoting are against the BB policy of most companies).


> From my understanding as a non security expert:

That certainly helps.


What a shame, HackerNews typically has more insightful comments than garbage like this.

Edit: thanks to everyone who wrote some insightful responses, and there are indeed many. Faith in HackerNews restored !


People are going to chit-chat about things only tangentially related to their areas of expertise; it is good when we’re honest about our limitations.

If nothing else, an obviously wrong take is a nice setup for a correction.


The true failure is government. Mozilla shouldn’t have to lead this. The prosecutor should be the regulator.


America reaps what America sows.


Wouldn’t have too much of an issue with this if it was confined to America, but unfortunately it’s not.

So basically “the rest of us suffer what America sows”


What is a state prosecutor going to prosecute microsoft on? Vague T&C? As great as it may sound having the state going around proactively enforcing T&C of every product is not going to be effective or fair.


No, because he is not telling you.. but he might tell someone he knows or cares about ?

Or his descendants might find a reference to it or figure out it was him ?


Bringing up lack of access to sanitation hardly matters in this context.

Almost everything can be deemed as not worth doing because we need to fix sanitation first.

The author of the post is probably implicitly trying to say ‘everyone [who can] should’.

The person who posted about sanitation and taking “everyone” to mean literally everyone in the world, is being overly pedantic in my opinion.


Less than 50% doesn’t qualify as most if the statement is about something binary and mutually exclusive.

If more than or equal to 46% qualifies as most, then both the statements would be correct:

(1) Most people don’t have access to sanitation.

(2) Most people do have access to sanitation.

That wouldn’t make logical sense.


On the subject of paying twice, it’s always irked me that we have income tax and then sales tax on the taxed income.


In the U.S., it is at least possible to avoid such double taxation (but only in some situations -- i.e. you were itemizing anyway instead of taking the standard deduction, and you live in a state with no income tax). https://ttlc.intuit.com/turbotax-support/en-us/help-article/...


I'm (Dutch) self-employed, which means I have my own one-man company, and as such, I can get my VAT back for stuff I buy for my business. Of course I also have to charge VAT for my services again, so that's expected to include the VAT for the stuff I bought.

But it does create a massive tax loophole: because I'm a software developer, I can deduct the costs of any computer I buy, but nobody is checking whether I actually use it for work or for gaming. I can deduct work lunches, but employees can't. I know someone who deducted his motorbike because he also used it for work. I can deduct phone and internet costs because I also use them for work.

I find the way I can avoid some taxes that others can't, rather questionable. Frankly, everybody should have their own company to avoid this inequality. And the stuff I can deduct is small potatoes compared to the stuff I'm sure some other people are deducting. I'm no tax expert, but I'm sure this is a big part of why billionaires pay so little tax.

Also, companies on the edge of the health care system have a problem, because health care is VAT free, so health care companies cannot get the VAT back they have to pay to their suppliers, which makes suppliers of services to the healthcare industry effectively more expensive than they should be. I think this whole system is in dire need of an overhaul.


You’ll find you’re not the first person who has discovered that you can cheat on your taxes by expensing personal purchases and by deducting things you are explicitly not allowed to deduct. The government’s inability to cheaply audit people like you means you won’t get in trouble. Your gut feeling that “it’s questionable” is right. Accountants lie about what deductions are allowed because they know the way to get happy customers is by producing tax savings, even where none exist. Just look up the tax laws for yourself and you’ll find that the “massive loophole” doesn’t exist.


But this isn't even cheating; this is stuff I am allowed to deduct. My accountant keeps bringing them up, and he's not the kind to cheat on this stuff. Other clients of his have been audited and received compliments for how well their stuff was in order. There are apparently very good reasons why this can be deducted. If the massive loophole doesn't exist, it's because it works as intended and is not a loophole at all, but to me it feels like a very grey area, because I don't think employees can't deduct all of this stuff.

And I'm certainly not going to look up tax laws; that's exactly what I'm paying my accountant for.


Your accountant is 100% wrong. If you buy a computer and use it 20% for work and 80% for hobby stuff or gaming then you can deduct it for 20%. That's the law. This takes 30 seconds to google and your refusal to do so is mystifying because your accountant isn't liable for filing your taxes wrong, you are.

Your accountant keeps bringing deductions up because he wants you to feel he's worth his fees. That's why literally every accountant I've ever worked with has told me that "a good accountant pays for himself". Accountants compete with each other based on how much they can lower your tax bill. So yes, of course they'll help you make unlawful tax deductions, and they'll reassure you that it's perfectly fine and that they have many years of experience etc etc.


Yes, and I'll do you one better: everybody should have their own company and there should be no "employee" option. Everything should be contracts. Makes it clearer it's not a family relationship, it's business.


Look at it from the viewpoint of someone with sufficient wealth: income taxes are wonderful, because they only apply to realised income. (and there is a whole cottage industry devoted to ways to cumulate gains without realising income)


I would really like to see sales tax replaced by a tax on the resources used for the product. It would be more complicated, but also a lot more just.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: